{"id":1872,"date":"2006-05-17T00:00:00","date_gmt":"2006-05-17T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/05\/17\/research-says-cisco-microsoft-lead-security-spending\/"},"modified":"2021-12-30T11:40:12","modified_gmt":"2021-12-30T11:40:12","slug":"research-says-cisco-microsoft-lead-security-spending","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/05\/17\/research-says-cisco-microsoft-lead-security-spending\/","title":{"rendered":"Research Says Cisco, Microsoft Lead Security Spending"},"content":{"rendered":"<p>The continued push into the security sector by IT leaders Cisco Systems and Microsoft is making hay with chief security officers, as a new poll of the executives finds that most will consider the well-known vendors&#8217; products in 2006 as they budget network and applications defense technologies.  In its inaugural survey of ranking CSOs at 50 Fortune 1000 companies in the United States, New York-based Citigroup Investment Research found that 32 percent of the IT leaders said they plan to increase their security budgets this year, while 54 percent said they expect to maintain their current level of spending.   According to Citigroup, some 64 percent of the CSOs interviewed said they plan to buy applications from security software vendors, while 33 percent said they are planning to purchase security products from companies that specialize primarily in data networking technology.  While only 33 percent of the executives interviewed said they prefer to buy from data networking vendors, 44 out of the 50 respondents said they have made at least some security purchases from Cisco.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>While Cisco has been marketing firewall technologies and other network-oriented security tools for almost a decade, Microsoft has only entered the applications market in the last year with several stand-alone products.  The software giant is further expected to have an effect on the anti-virus market with the launch of its next-generation Windows operating system, known as Vista, scheduled to arrive sometime in 2007.<br \/>\nRival Juniper Networks ranked second for such investments, far behind Cisco, with only four of the CSOs mentioning the company.<\/p>\n<p>In a surprisingly good showing among applications vendors, Microsoft dwarfed other providers including anti-virus market leader Symantec in the report.  Some 68 percent of those involved in the research said they currently use security software from Microsoft, while only 26 percent said they are using Symantec&#8217;s tools.  Of those interviewed, 36 percent said they would prefer to work with one primary security software vendor, versus the 34 percent that indicated they would not want to consolidate security relationships, with 44 percent of those favoring the integrated approach listing Microsoft as their preferred provider.<\/p>\n<p>Some 40 percent of the executives interviewed for the study said that they are currently evaluating applications-specific security measures.   Of those executives, 62 percent said that they are somewhat likely to deploy applications-level security this year, with another 36 percent saying that they are either very likely or certain to do so. <\/p>\n<p>http:\/\/www.eweek.com\/article2\/0,1759,1963992,00.asp?kc=EWRSS03119TX1K0000594<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1872","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1872","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1872"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1872\/revisions"}],"predecessor-version":[{"id":4359,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1872\/revisions\/4359"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1872"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1872"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1872"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}